Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+25.52%)
Mutual labels: arm, x64, malware, cybersecurity, x86, assembly-language-programming, cyber-security, arm-assembly, reverse-engineering-tutorial, cyber-threat-intelligence, assembly-x86-64, assembly-arm Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-99.34%)
Reverse EngineeringThis repository contains some of the executables that I've cracked.
Stars: ✭ 29 (-99.5%)
PwnshopExploit Development, Reverse Engineering & Cryptography
Stars: ✭ 167 (-97.1%)
rawsec-cybersecurity-inventoryAn inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (-97.35%)
X64dbgAn open-source x64/x32 debugger for windows.
Stars: ✭ 37,825 (+556.34%)
fdtd3dfdtd3d is an open source 1D, 2D, 3D FDTD electromagnetics solver with MPI, OpenMP and CUDA support for x86, arm, arm64 architectures
Stars: ✭ 77 (-98.66%)
Inline Hooksimple inline-hook framework works for x86, x64, arm and thumb
Stars: ✭ 102 (-98.23%)
opcodesDBx86-64 | ARM (AArch32/AArch64/THUMB) full instruction set.
Stars: ✭ 49 (-99.15%)
BapBinary Analysis Platform
Stars: ✭ 1,385 (-75.97%)
UnicornUnicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, X86)
Stars: ✭ 4,934 (-14.38%)
8086-cheatsheet8086 Microprocessor Cheat sheet with Programs
Stars: ✭ 81 (-98.59%)
KeystoneKeystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
Stars: ✭ 1,654 (-71.3%)
AntidebuggingA collection of c++ programs that demonstrate common ways to detect the presence of an attached debugger.
Stars: ✭ 161 (-97.21%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+98.96%)
KeypatchMulti-architecture assembler for IDA Pro. Powered by Keystone Engine.
Stars: ✭ 939 (-83.71%)
RekoReko is a binary decompiler.
Stars: ✭ 942 (-83.65%)
CapstoneCapstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Stars: ✭ 5,374 (-6.75%)
Barf ProjectBARF : A multiplatform open source Binary Analysis and Reverse engineering Framework
Stars: ✭ 1,280 (-77.79%)
RatelRAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
Stars: ✭ 121 (-97.9%)
Capstone.NET.NET Core and .NET Framework binding for the Capstone Disassembly Framework
Stars: ✭ 108 (-98.13%)
PlasmaPlasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Stars: ✭ 2,956 (-48.71%)
cross“Zero setup” cross compilation and “cross testing” of Rust crates
Stars: ✭ 3,550 (-38.4%)
ThreatPursuit-VMThreat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Stars: ✭ 1,033 (-82.08%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (-95.02%)
asmdot[Unstable] Fast, zero-copy and lightweight (Arm | Mips | x86) assembler in (C | C++ | C# | Go | Haskell | Javascript | Nim | OCaml | Python | Rust).
Stars: ✭ 23 (-99.6%)
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (-94.76%)
alpine-php-fpmLightweight and optimised PHP-FPM (PHP 7.4, 8.0, 8.1) Docker images with essential extensions on top of latest Alpine Linux.
Stars: ✭ 53 (-99.08%)
LbforthSelf-hosting metacompiled Forth, bootstrapping from a few lines of C; targets Linux, Windows, ARM, RISC-V, 68000, PDP-11, asm.js.
Stars: ✭ 293 (-94.92%)
attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-99.01%)
cpuwhatNim utilities for advanced CPU operations: CPU identification, ISA extension detection, bindings to assorted intrinsics
Stars: ✭ 25 (-99.57%)
Gta ReversedReversed code of GTA:SA executable (gta_sa.exe) 1.0 US
Stars: ✭ 297 (-94.85%)
GoRATGoRAT (Go Remote Access Tool) is an extremely powerful reverse shell, file server, and control plane using HTTPS reverse tunnels as a transport mechanism.
Stars: ✭ 34 (-99.41%)
SwitHak.github.ioSwitHak' Security Place for my Opinions and Work
Stars: ✭ 30 (-99.48%)
argusArgus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (-98.49%)
Reloaded.AssemblerMinimal .NET wrapper around the simple, easy to use Flat Assembler written by Tomasz Grysztar. Supports both x64 and x86 development.
Stars: ✭ 17 (-99.71%)
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (-92.4%)
kernelMain kernel tree
Stars: ✭ 28 (-99.51%)
l4re-coreThe core components of the L4Re operating system.
Stars: ✭ 39 (-99.32%)
auroraMalware similarity platform with modularity in mind.
Stars: ✭ 70 (-98.79%)
MalsubA Python RESTful API framework for online malware analysis and threat intelligence services.
Stars: ✭ 308 (-94.66%)
tupaiTupai is a multi-tasking operating system I wrote for my degree that focuses on safety and design, targeting a variety of platforms.
Stars: ✭ 21 (-99.64%)
URL-obfuscatorPython Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-98.25%)
robot hacking manualRobot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (-97.07%)
cyberopsCisco Press CCNA Cyber Ops Books and Video Courses supplemental information and additional study materials.
Stars: ✭ 18 (-99.69%)
FukuroSimple microkernel (early stage)
Stars: ✭ 18 (-99.69%)
CTF-Write-UP澳門網絡安全暨奪旗競賽協會(Macau Cyber Security and Capture The Flag Association)MOCSCTF/MOCTF
Stars: ✭ 27 (-99.53%)
docker-nagiosDocker image for Nagios Core in Alpine Linux with basic plugins, available for x86, x64 , ARM v6, ARM v7 and ARM64.
Stars: ✭ 33 (-99.43%)
Saraff.Twain.NETSaraff.Twain.NET is the skillful scanning component which allows you to control work of flatbed scanner, web and digital camera and any other TWAIN device from .NET environment. You can use this library in your programs written in any programming languages compatible with .NET technology.
Stars: ✭ 74 (-98.72%)
SherlockThis script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Stars: ✭ 36 (-99.38%)
Nt wrapperA wrapper library around native windows sytem APIs
Stars: ✭ 287 (-95.02%)
static-web-serverA blazing fast and asynchronous web server for static files-serving. ⚡
Stars: ✭ 230 (-96.01%)